How To Find The MAC Address On Computer

The MAC address or MAC Address (media access control address) of a device is a unique identifier that is assigned to network interfaces. Wireless or Ethernet network cards, routers, printers, etc., all have their own 48-bit identifier that is not repeated around the world, it is like your own fingerprint to communicate. In a computer network, computers can be identified through the IP address, but they can also be identified by their MAC address.

mac address

Manufacturers typically add this identifier when devices are manufactured, and it is usually stored in the hardware’s ROM (read-only memory), or some other firmware mechanism. For this reason, it is impossible to modify since it is in a read-only area that cannot be altered. In addition, there is also a regulatory body that is responsible for providing the standards by which MAC addresses are assigned, this is the Institute of Electrical and Electronic Engineering (IEEE).


Understanding that the MAC address is a unique identifier for all network devices, we know that any device that has hardware that allows it to connect to a network has its own MAC Address. Computers, mobile phones, tablets, routers, printers, switches, etc. Everyone has their own address.

One of the most common uses that users give to MAC addresses is to restrict access to a network. Probably many have had their first contact with this term when they decided to delve into the configuration of their routers. We can use the MAC address to allow or restrict access to only certain devices. It is a good way to ensure the security of your network if you only authorize the MAC addresses of your own computers and do not allow the connection of any unknown MAC Address.

The MAC Address can also be used to obtain the location of a device through GPS, which can allow tracking of a person’s movements, and is much more accurate than geolocation through IP. If we have the WiFi on and we approach a router, we are immediately leaving our MAC address in your registry.


As we mentioned before, the MAC Address is in read-only memory and cannot be altered, but it can be masked or hidden. The MAC spoofing or MAC suplantanci√≥n, is a technique to “change the MAC address” into believing the operating system to have a different one. By doing this you can change the identity of a device for whatever reason. For example, when we connect to a public WiFi network, we can prevent a malicious user from cloning our MAC address and commenting on crime using the identifier of our computer, and “leaving us dead.”

We can also skip access control lists on servers or routers if we change our MAC Address, supplanting the address of another authorized device or simply using a new one that is not among those blocked. Clearly these types of practices can be used for both legal and illegal purposes.

Add a Comment

Your email address will not be published. Required fields are marked *